CVE-2017-11147
php: Out-of-bounds read in phar_parse_pharfile
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In PHP before 5.6.30 and 7.x before 7.0.15, the PHAR archive handler could be used by attackers supplying malicious archive files to crash the PHP interpreter or potentially disclose information due to a buffer over-read in the phar_parse_pharfile function in ext/phar/phar.c.
En PHP anterior a versión 5.6.30 y versión 7.x anterior a 7.0.15, el manejador de archivos PHAR podría ser utilizado por archivos maliciosos suministrados por los atacantes para bloquear el intérprete PHP o potencialmente divulgar información debido a una lectura excesiva de búfer en la función phar_parse_pharfile en el archivo ext/phar/phar.c.
It was discovered that the PHP opcache created keys for files it cached based on their filepath. A local attacker could possibly use this issue in a shared hosting environment to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS. It was discovered that the PHP URL parser incorrectly handled certain URI components. A remote attacker could possibly use this issue to bypass hostname-specific URL checks. This issue only affected Ubuntu 14.04 LTS. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-10 CVE Reserved
- 2017-07-10 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-125: Out-of-bounds Read
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5246580a85f031e1a3b8064edbaa55c1643a451 | X_refsource_confirm | |
http://www.securityfocus.com/bid/99607 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20180112-0001 | Third Party Advisory |
|
https://www.tenable.com/security/tns-2017-12 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugs.php.net/bug.php?id=73773 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
http://openwall.com/lists/oss-security/2017/07/10/6 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://php.net/ChangeLog-5.php | 2023-11-07 | |
http://php.net/ChangeLog-7.php | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:1296 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-11147 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1471842 | 2018-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | < 5.6.30 Search vendor "Php" for product "Php" and version " < 5.6.30" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.0.0 < 7.0.15 Search vendor "Php" for product "Php" and version " >= 7.0.0 < 7.0.15" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.1.0 < 7.1.1 Search vendor "Php" for product "Php" and version " >= 7.1.0 < 7.1.1" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Clustered Data Ontap Search vendor "Netapp" for product "Clustered Data Ontap" | - | - |
Affected
|